You want to store the GAiA configuration in a file for later reference. What command should you use?
John is the administrator of a R80 Security Management server managing r R77.30 Check Point Security Gateway. John is currently updating the network objects and amending the rules using SmartConsole. To make John’s changes available to other administrators, and to save the database before installing a policy, what must John do?
Which method below is NOT one of the ways to communicate using the Management API’s?
Which of the following statements about Site-to-Site VPN Domain-based is NOT true?
If there are two administrators logged in at the same time to the SmartConsole, and there are objects locked for editing, what must be done to make them available to other administrators? Choose the BEST answer
What licensing feature is used to verify licenses and activate new licenses added to the License and Contracts repository?
The Gateway Status view in SmartConsole shows the overall status of Security Gateways and Software Blades. What does the Status Attention mean?
Fill in the blank Once a license is activated, a___________should be installed.
What is the most complete definition of the difference between the Install Policy button on the SmartConsole’s tab, and the Install Policy within a specific policy?
After trust has been established between the Check Point components, what is TRUE about name and IP-address changes?
When changes are made to a Rule base, it is important to _______________ to enforce changes.
When configuring LDAP User Directory integration, Changes applied to a User Directory template are:
Which deployment adds a Security Gateway to an existing environment without changing IP routing?
Which is a suitable command to check whether Drop Templates are activated or not?
You have discovered suspicious activity in your network. What is the BEST immediate action to take?
Which type of Check Point license is tied to the IP address of a specific Security Gateway and cannot be transferred to a gateway that has a different IP address?
While enabling the Identity Awareness blade the Identity Awareness wizard does not automatically detect the windows domain Why does it not detect the windows domain?
What are valid authentication methods for mutual authenticating the VPN gateways?
Vanessa is attempting to log into the Gaia Web Portal. She is able to login successfully. Then she tries the same username and password for SmartConsole but gets the message in the screenshot image below. She has checked that the IP address of the Server is correct and the username and password she used to login into Gaia is also correct.
What is the most likely reason?
Gaia has two default user accounts that cannot be deleted. What are those user accounts?
Using ClusterXL, what statement is true about the Sticky Decision Function?
Which two Identity Awareness daemons are used to support identity sharing?
Fill in the blank RADIUS Accounting gets_____data from requests generated by the accounting client
What key is used to save the current CPView page in a filename format cpview_“cpview process IDâ€. capâ€number of capturesâ€?
Fill in the blank: In order to install a license, it must first be added to the ____________.
When doing a Stand-Alone Installation, you would install the Security Management Server with which other Check Point architecture component?
When configuring Spoof Tracking, which tracking actions can an administrator select to be done when spoofed packets are detected?
Traffic from source 192.168.1.1 is going to www.google.com. The Application Control Blade on the gateway is inspecting the traffic. Assuming acceleration is enable which path is handling the traffic?
Choose what BEST describes the reason why querying logs now are very fast.
Which Check Point Software Wade provides visibility of users, groups and machines while also providing access control through identity-based policies?
In HTTPS Inspection policy, what actions are available in the "Actions" column of a rule?
AdminA and AdminB are both logged in on SmartConsole What does it mean if AdmmB sees a lock icon on a rule? Choose the BEST answer.
Which of the following is used to extract state related information from packets and store that information in state tables?
In R80 Management, apart from using SmartConsole, objects or rules can also be modified using:
Which one of these features is NOT associated with the Check Point URL Filtering and Application Control Blade?
Customer’s R80 management server needs to be upgraded to R80.10. What is the best upgrade method when the management server is not connected to the Internet?
There are four policy types available for each policy package. What are those policy types?
Fill in the bank: In Office mode, a Security Gateway assigns a remote client to an IP address once___________.
Which single Security Blade can be turned on to block both malicious files from being downloaded as well as block websites known to host malware?
You want to store the GAiA configuration in a file for later reference. What command should you use?
Which of the following situations would not require a new license to be generated and installed?
Fill in the blank: Once a certificate is revoked from the Security GateWay by the Security Management Server, the certificate information is _______.
When a gateway requires user information for authentication, what order does it query servers for user information?
Fill in the blank: When tunnel test packets no longer invoke a response, SmartView Monitor displays _____________ for the given VPN tunnel.
SandBlast offers flexibility in implementation based on their individual business needs. What is an option for deployment of Check Point SandBlast Zero-Day Protection?
If there is an Accept Implied Policy set to "First", what is the reason Jorge cannot see any logs?
In what way is Secure Network Distributor (SND) a relevant feature of the Security Gateway?
Which information is included in the “Extended Log†tracking option, but is not included in the “Log†tracking option?
SmartEvent does NOT use which of the following procedures to identity events:
Which is a main component of the Check Point security management architecture?
What are the three main components of Check Point security management architecture?
To view the policy installation history for each gateway, which tool would an administrator use?
Which product correlates logs and detects security threats, providing a centralized display of potential attack patterns from all network devices?
Which option, when applied to a rule, allows traffic to VPN gateways in specific VPN communities?
What are the Threat Prevention software components available on the Check Point Security Gateway?
Which is NOT an encryption algorithm that can be used in an IPSEC Security Association (Phase 2)?
Fill in the blanks: The Application Layer Firewalls inspect traffic through the ______ layer(s) of the TCP/IP model and up to and including the ______ layer.
You have successfully backed up your Check Point configurations without the OS information. What command would you use to restore this backup?
True or False: In a Distributed Environment, a Central License can be installed via CLI on a Security Gateway
The default shell of the Gaia CLI is cli.sh. How do you change from the cli.sh shell to the advanced shell to run Linux commands?
Which of the following is NOT an authentication scheme used for accounts created through SmartConsole?
Your internal networks 10.1.1.0/24, 10.2.2.0/24 and 192.168.0.0/16 are behind the Internet Security Gateway. Considering that Layer 2 and Layer 3 setup is correct, what are the steps you will need to do in SmartConsole in order to get the connection working?
Name the utility that is used to block activities that appear to be suspicious.
Which method below is NOT one of the ways to communicate using the Management API’s?
Which tool allows for the automatic updating of the Gaia OS and Check Point products installed on the Gaia OS?
Which of the following is NOT an identity source used for Identity Awareness?
In SmartConsole, on which tab are Permissions and Administrators defined?
Which SmartConsole tab is used to monitor network and security performance?
Where is the “Hit Count†feature enabled or disabled in SmartConsole?
An administrator wishes to use Application objects in a rule in their policy but there are no Application objects listed as options to add when clicking the"+" to add new items to the "Services & Applications" column of a rule. What should be done to fix this?